메뉴 건너뛰기




Volumn 12, Issue 7, 2013, Pages 1456-1468

United we stand: Intrusion resilience in mobile unattended WSNs

Author keywords

distributed adversary; intrusion resilience; mobility; self healing; WSN security

Indexed keywords

COOPERATIVE PROTOCOLS; DISTRIBUTED ADVERSARY; EXTENSIVE SIMULATIONS; INTRUSION RESILIENCE; SELF-HEALING; UNATTENDED WIRELESS SENSOR NETWORKS; WIRELESS SENSOR NETWORK (WSNS); WSN SECURITY;

EID: 84878125727     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2012.126     Document Type: Article
Times cited : (19)

References (33)
  • 3
    • 0013091373 scopus 로고    scopus 로고
    • Nat'l Inst. of Standards and Technology
    • Nat'l Inst. of Standards and Technology, "FIPS Pub 198: The Keyed-Hash Message Authentication Code," http://csrc.nist. gov/publications/fips/fips198/fips-198a.pdf, 2002.
    • (2002) FIPS Pub 198: The Keyed-Hash Message Authentication Code
  • 5
    • 31444433096 scopus 로고    scopus 로고
    • Protecting against key-exposure: Strongly key-insulated encryption with optimal threshold
    • DOI 10.1007/s00200-005-0183-y
    • M. Bellare and A. Palacio, "Protecting Against Key-Exposure: Strongly Key-Insulated Encryption with Optimal Threshold," Applicable Algebra in Eng., Comm. and Computing, vol. 16, no. 6, pp. 379-396, 2006. (Pubitemid 43152914)
    • (2006) Applicable Algebra in Engineering, Communications and Computing , vol.16 , Issue.6 , pp. 379-396
    • Bellare, M.1    Palacio, A.2
  • 8
    • 65249138169 scopus 로고    scopus 로고
    • New adversary and new threats: Security in unattended sensor networks
    • Mar.
    • D. Ma, C. Soriente, and G. Tsudik, "New Adversary and new Threats: Security in Unattended Sensor Networks," IEEE Network, vol. 23, no. 2, pp. 43-48, Mar. 2009.
    • (2009) IEEE Network , vol.23 , Issue.2 , pp. 43-48
    • Ma, D.1    Soriente, C.2    Tsudik, G.3
  • 11
    • 38549139180 scopus 로고    scopus 로고
    • Constant storage self-healing key distribution with revocation in wireless sensor network
    • DOI 10.1109/ICC.2007.223, 4288894, 2007 IEEE International Conference on Communications, ICC'07
    • R. Dutta, Y.D. Wu, and S. Mukhopadhyay, "Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network," Proc. IEEE Int'l Conf. Comm. (ICC '07), pp. 1323-1328, 2007. (Pubitemid 351145719)
    • (2007) IEEE International Conference on Communications , pp. 1323-1328
    • Dutta, R.1    Wu, Y.D.2    Mukhopadhyay, S.3
  • 15
    • 25644433619 scopus 로고    scopus 로고
    • Sensor relocation in mobile sensor networks
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • G. Wang, G. Cao, T.F. La Porta, and W. Zhang, "Sensor Relocation in Mobile Sensor Networks," Proc. IEEE INFOCOM, pp. 2302-2312, 2005. (Pubitemid 41382347)
    • (2005) Proceedings - IEEE INFOCOM , vol.4 , pp. 2302-2312
    • Wang, G.1    Cao, G.2    La Porta, T.3    Zhang, W.4
  • 20
    • 67650465277 scopus 로고    scopus 로고
    • Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
    • R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1463-1475, 2009.
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1463-1475
    • Di Pietro, R.1    Mancini, L.V.2    Soriente, C.3    Spognardi, A.4    Tsudik, G.5
  • 23
    • 0038675868 scopus 로고    scopus 로고
    • A survey of mobility models for ad hoc network research
    • DOI 10.1002/wcm.72
    • T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Comm. and Mobile Computing (WCMC), Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, pp. 483-502, 2002. (Pubitemid 135713186)
    • (2002) Wireless Communications and Mobile Computing , vol.2 , Issue.5 , pp. 483-502
    • Camp, T.1    Boleng, J.2    Davies, V.3
  • 24
    • 4444358549 scopus 로고    scopus 로고
    • Time synchronization in sensor networks: A survey
    • July/Aug.
    • F. Sivrikaya and B. Yener, "Time Synchronization in Sensor Networks: A Survey," IEEE Network, vol. 18, no. 4, pp. 45-50, July/Aug. 2004.
    • (2004) IEEE Network , vol.18 , Issue.4 , pp. 45-50
    • Sivrikaya, F.1    Yener, B.2
  • 26
    • 75149140941 scopus 로고    scopus 로고
    • Shortpk: A short-term public key scheme for broadcast authentication in sensor networks
    • Jan.
    • R. Wang, W. Du, X. Liu, and P. Ning, "ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks," ACM Trans. Sensor Networks, vol. 6, pp. 9:1-9:29, Jan. 2010.
    • (2010) ACM Trans. Sensor Networks , vol.6 , pp. 91-929
    • Wang, R.1    Du, W.2    Liu, X.3    Ning, P.4
  • 27
    • 84880904783 scopus 로고    scopus 로고
    • OAEP Reconsidered
    • Advances in Cryptology - CRYPTO 2001
    • V. Shoup, "OAEP Reconsidered," Proc. 21st Ann. Int'l Cryptology Conf. (CRYPTO '01), pp. 239-259, 2001. (Pubitemid 33317919)
    • (2001) Lecture Notes In Computer Science , Issue.2139 , pp. 239-259
    • Shoup, V.1
  • 29
    • 19944369062 scopus 로고    scopus 로고
    • Soft tamper-proofing via program integrity verification in wireless sensor networks
    • DOI 10.1109/TMC.2005.44
    • T. Park and K.G. Shin, "Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 4, no. 3, pp. 297-309, May/June 2005. (Pubitemid 40750777)
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.3 , pp. 297-309
    • Park, T.1    Shin, K.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.